COMP 90508

subject Type Homework Help
subject Pages 15
subject Words 1749
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A __________ is any action that compromises the security of information owned by an
organization.
A. security mechanism
B. security policy
C. security attack
D. security service
_______ is a form of crime that targets a computer system to acquire information stored
on that computer system, to control the target system without authorization or payment,
or to alter the integrity of data or interfere with the availability of the computer or
server.
A. Computers as targets
B. Computers as storage devices
C. Computers as mediums
D. Computers as communication tools
Modes of operation are the alternative techniques that have been developed to increase
the security of symmetric block encryption for large sequences of data.
page-pf2
Incorrect handling of program _______ is one of the most common failings in software
security.
A. lines
B. input
C. output
D. disciplines
________ includes data processing and storage equipment, transmission and
networking facilities, and offline storage media.
A. Supporting facilities
B. Physical facilities
C. Information system hardware
D. Infrastructure facilities
page-pf3
__________ is the traditional method of implementing access control.
A. MAC
B. RBAC
C. DAC
D. MBAC
Malicious software aims to trick users into revealing sensitive personal data.
__________ ensures that critical assets are sufficiently protected in a cost-effective
manner.
A. IT control
B. IT security management
C. IT discipline
D. IT risk implementations
page-pf4
_______ certificates are used in most network security applications, including IP
security, secure sockets layer, secure electronic transactions, and S/MIME.
A. X.509
B. PKI
C. FIM
D. SCA
________ is a process that ensures a system is developed and operated as intended by
the system's security policy.
A. Trust
B. Assurance
C. Evaluation
D. Functionality
page-pf5
The __________ strategy is when users are told the importance of using hard to guess
passwords and provided with guidelines for selecting strong passwords.
A. reactive password checking
B. computer-generated password
C. proactive password checking
D. user education
The __________ cloud infrastructure is a composition of two or more clouds that
remain unique entities but are bound together by standardized or proprietary technology
that enables data and application portability.
A. hybrid
B. community
C. private
D. public
page-pf6
On average, __________ of all possible keys must be tried in order to achieve success
with a brute-force attack.
A. one-fourth
B. half
C. two-thirds
D. three-fourths
__________ encompasses intrusion detection, prevention and response.
A. Intrusion management
B. Security assessments
C. Database access control
D. Data loss prevention
The principal attraction of __________ compared to RSA is that it appears to offer
equal security for a far smaller bit size, thereby reducing processing overhead.
A. ECC
B. MD5
page-pf7
C. Diffie-Hellman
D. none of the above
From a security point of view, which of the following actions should be done upon the
termination of an employee?
A. remove the person's name from all lists of authorized access
B. recover all assets, including employee ID, disks, documents and equipment
C. remove all personal access codes
D. all of the above
If the only form of attack that could be made on an encryption algorithm is brute-force,
then the way to counter such attacks would be to __________ .
A. use longer keys
B. use shorter keys
C. use more keys
D. use less keys
page-pf8
Defensive programming is sometimes referred to as _________.
A. variable programming
B. secure programming
C. interpretive programming
D. chroot programming
The most important symmetric algorithms, all of which are block ciphers, are the DES,
triple DES, and the __________.
A. SHA
B. RSA
C. AES
D. DSS
page-pf9
______ systems should not run automatic updates because they may possibly introduce
instability.
A. Configuration controlled
B. Policy controlled
C. Change controlled
D. Process controlled
_____ can be copyrighted.
A. Dramatic works
B. Architectural works
C. Software-related works
D. All of the above
The success of cybercriminals, and the relative lack of success of law enforcement,
influence the behavior of _______.
A. cyber thieves
page-pfa
B. cybercrime victims
C. cybercrime acts
D. cyber detectives
The most complex part of TLS is the __________.
A. signature
B. message header
C. payload
D. handshake protocol
A __________ type of attack exploits properties of the RSA algorithm.
A. timing
B. brute-force
C. chosen ciphertext
D. mathematical
page-pfb
_______ is the process in which a CA issues a certificate for a user's public key and
returns that certificate to the user's client system and/or posts that certificate in a
repository.
A. Certification
B. Registration
C. Initialization
D. Authorization
Masquerade, falsification, and repudiation are threat actions that cause __________
threat consequences.
A. unauthorized disclosure
B. disruption
C. deception
D. usurpation
page-pfc
______ mode is typically used for a general-purpose block-oriented transmission and is
useful for high-speed requirements.
A. ECB
B. OFB
C. CFB
D. CTR
_______ is the process whereby a user first makes itself known to a CA prior to that CA
issuing a certificate or certificates for that user.
A. Authorization
B. Registration
C. Certification
D. Initialization
page-pfd
__________ are attacks that attempt to give ordinary users root access.
A. Privilege-escalation exploits
B. Directory transversals
C. File system access
D. Modification of system resources
The buffer overflow type of attack has been known since it was first widely used by the
__________ Worm in 1988.
A. Code Red
B. Slammer
C. Morris Internet
D. Alpha One
______ software is a centralized logging software package similar to, but much more
complex than, syslog.
A. NetScan
B. McAfee
page-pfe
C. IPConfig
D. SIEM
Timing attacks are only applicable to RSA.
The foundation of a security auditing facility is the initial capture of the audit data.
Establishing security policy, objectives, processes and procedures is part of the ______
step.
A. plan
B. check
page-pff
C. act
D. none of the above
Data items to capture for a security audit trail include:
A. events related to the security mechanisms on the system
B. operating system access
C. remote access
D. all of the above
Most browsers come equipped with SSL and most Web servers have implemented the
protocol.
page-pf10
A __________ is data appended to, or a cryptographic transformation of, a data unit
that allows a recipient of the data unit to prove the source and integrity of the data unit
and protect against forgery.
The goal of the _______ function is to ensure that all information destined for the
incident handling service is channeled through a single focal point regardless of the
method by which it arrives for appropriate redistribution and handling within the
service.
As an alternative the RSA public-key encryption algorithm can be used with either the
SHA-1 or the MD5 message digest algorithm for forming signatures.
Business continuity consists of security services that allocate access, distribute, monitor,
page-pf11
and protect the underlying resource services.
Like TKIP, CCMP provides two services: message integrity and ________.
_________ simulate human brain operation with neurons and synapse between them
that classify observed data
X.800 defines __________ as the prevention of unauthorized use of a
resource, including the prevention of use of a resource in an unauthorized manner.
page-pf12
Employees cannot be expected to follow policies and procedures of which they are
unaware.
________ detection techniques detect intrusion by observing events in the system and
applying a set of rules that lead to a decision regarding whether a given pattern of
activity is or is not suspicious.
A major disadvantage of the baseline risk assessment approach is the significant cost in
time, resources, and expertise needed to perform the analysis.
page-pf13
In the United States the ______ and the NSA jointly operate the Common Criteria
Evaluation and Validation Scheme.
HMAC can be proven secure provided that the embedded hash function has some
reasonable cryptographic strengths.
In large and medium-sized organizations, a(n) _________ is responsible for rapidly
detecting incidents, minimizing loss and destruction, mitigating the weaknesses that
were exploited, and restoring computing services.
_______ threats encompass threats related to electrical power and electromagnetic
emission.
page-pf14
Program _______ refers to any source of data that originates outside the program and
whose value is not explicitly known by the programmer when the code was written.
"Must support hash value lengths of 224, 256,384, and 512 bits" and "algorithm must
process small blocks at a time instead of requiring the entire message to be buffered in
memory before processing it" are requirements for ________.
A user may belong to multiple groups.
page-pf15
An essential component of many buffer overflow attacks is the transfer of execution to
code supplied by the attacker and often saved in the buffer being overflowed. This code
is known as _________ .

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.